We consider the problem of using artificially generated cover traffic to hide the network paths used by an application against an adversarial observer who can monitor network traffic and perform traffic analysis. We propose that on-demand link padding be used on top of existing traffic anonymizing infrastructures such as those described in the Onion Routing Project or in the ANON Project. In on-demand link padding, cover traffic is generated dynamically only when real traffic is present. Moreover, the bandwidth usage is economical because we only generate a small amount of cover traffic above real traffic. We describe two types of on-demand link padding schemes and evaluate their performance by simulation. We report our findings based on th...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
In hostile environments, the enemy can launch traffic analysis against interceptable routing inform...
Part 4: Security Protocol PracticesInternational audienceAnonymization networks (e.g., Tor) help in ...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
Low latency anonymity systems are susceptive to traffic anal-ysis attacks. In this paper, we propose...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
Abstract-In this paper, we address issues related to preventing traffic analysis in computer network...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
An increasing number of recent experimental works have demonstrated that the supposedly secure chann...
Abstract Traffic analysis has definitely shown that encryption is not enough to protect the privacy ...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Traffic flow features like packet lengths, direction, gap times have been shown to carry significant...
In this paper we present a technical description of onion routing, an anonymizing protocol that prot...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...
Intruders often want to analyze traffic pattern to get information for his some malicious activities...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
In hostile environments, the enemy can launch traffic analysis against interceptable routing inform...
Part 4: Security Protocol PracticesInternational audienceAnonymization networks (e.g., Tor) help in ...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
Low latency anonymity systems are susceptive to traffic anal-ysis attacks. In this paper, we propose...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
Abstract-In this paper, we address issues related to preventing traffic analysis in computer network...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
An increasing number of recent experimental works have demonstrated that the supposedly secure chann...
Abstract Traffic analysis has definitely shown that encryption is not enough to protect the privacy ...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Traffic flow features like packet lengths, direction, gap times have been shown to carry significant...
In this paper we present a technical description of onion routing, an anonymizing protocol that prot...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...
Intruders often want to analyze traffic pattern to get information for his some malicious activities...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
In hostile environments, the enemy can launch traffic analysis against interceptable routing inform...
Part 4: Security Protocol PracticesInternational audienceAnonymization networks (e.g., Tor) help in ...